/foundation/filemanagement/storage_service/services/storage_manager/client/test/ |
H A D | get_self_permissions.cpp | 27 const std::vector<std::string> &permission, uint64_t &tokenId) in SetAccessTokenPermission() 29 auto perms = std::make_unique<const char *[]>(permission.size()); in SetAccessTokenPermission() 30 for (size_t i = 0; i < permission.size(); i++) { in SetAccessTokenPermission() 31 perms[i] = permission[i].c_str(); in SetAccessTokenPermission() 36 .permsNum = permission.size(), in SetAccessTokenPermission() 26 SetAccessTokenPermission(const std::string &processName, const std::vector<std::string> &permission, uint64_t &tokenId) SetAccessTokenPermission() argument
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/data_share/strategies/general/ |
H A D | permission_strategy.cpp | 25 if (context->permission == "reject") {
in operator ()() 26 ZLOGE("reject permission");
in operator ()() 29 if (!context->isAllowCrossPer && !context->permission.empty()) {
in operator ()() 31 Security::AccessToken::AccessTokenKit::VerifyAccessToken(context->callerTokenId, context->permission);
in operator ()() 33 ZLOGE("Verify permission denied! callerTokenId:%{public}u permission:%{public}s",
in operator ()() 34 context->callerTokenId, context->permission.c_str());
in operator ()()
|
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/src/ipc_security/ |
H A D | rs_ipc_interface_code_access_verifier_base.cpp | 22 { PermissionType::CAPTURE_SCREEN, "ohos.permission.CAPTURE_SCREEN" }, 23 { PermissionType::UPDATE_CONFIGURATION, "ohos.permission.UPDATE_CONFIGURATION" }, 24 { PermissionType::GET_RUNNING_INFO, "ohos.permission.GET_RUNNING_INFO" }, 54 const Security::AccessToken::AccessTokenID tokenID, const std::string& permission) const in CheckNativePermission() 56 int result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(tokenID, permission, false); in CheckNativePermission() 64 const Security::AccessToken::AccessTokenID tokenID, const std::string& permission) const in CheckHapPermission() 66 int result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(tokenID, permission, false); in CheckHapPermission() 79 for (auto& permission : permissions) { in CheckPermission() 82 hasPermission = CheckHapPermission(tokenID, permission); in CheckPermission() 85 hasPermission = CheckNativePermission(tokenID, permission); in CheckPermission() [all...] |
/foundation/bundlemanager/bundle_framework/services/bundlemgr/test/unittest/bms_bundle_permission_grant_test/ |
H A D | bms_bundle_permission_start_full_test.cpp | 186 DefaultPermission permission; in HWTEST_F() local 188 res = BundlePermissionMgr::MatchSignature(permission, signatures); in HWTEST_F() 203 DefaultPermission permission; in HWTEST_F() local 204 permission.appSignature.push_back("appSignature"); in HWTEST_F() 207 res = BundlePermissionMgr::MatchSignature(permission, signatures); in HWTEST_F() 222 DefaultPermission permission; in HWTEST_F() local 223 permission.appSignature.push_back("appSignature"); in HWTEST_F() 226 res = BundlePermissionMgr::MatchSignature(permission, signatures); in HWTEST_F() 241 DefaultPermission permission; in HWTEST_F() local
|
/foundation/bundlemanager/app_domain_verify/services/src/manager/permission/ |
H A D | permission_manager.cpp | 22 bool PermissionManager::CheckPermission(const std::string& permission) in CheckPermission() argument 25 if (permission.empty()) { in CheckPermission() 26 APP_DOMAIN_VERIFY_HILOGE(APP_DOMAIN_VERIFY_MGR_MODULE_SERVICE, "permission empty."); in CheckPermission() 30 int result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in CheckPermission() 33 "permission check failed, permission:%{public}s, callerToken:%{public}u", permission.c_str(), callerToken); in CheckPermission()
|
/foundation/distributeddatamgr/data_share/frameworks/native/permission/src/ |
H A D | data_share_permission.cpp | 42 auto permission = isRead ? providerInfo.readPermission : providerInfo.writePermission; in VerifyPermission() local 43 if (permission.empty()) { in VerifyPermission() 49 Security::AccessToken::AccessTokenKit::VerifyAccessToken(tokenID, permission); in VerifyPermission() 51 LOG_ERROR("Permission denied! token:0x%{public}x,permission:%{public}s,uri:%{public}s", in VerifyPermission() 52 tokenID, permission.c_str(), DataShareStringUtils::Anonymous(providerInfo.uri).c_str()); in VerifyPermission()
|
/foundation/ability/ability_runtime/frameworks/native/runtime/ |
H A D | js_error_utils.cpp | 61 void ThrowNoPermissionError(napi_env env, const std::string& permission) in ThrowNoPermissionError() argument 65 GetNoPermissionErrorMsg(permission))); in ThrowNoPermissionError() 95 napi_value CreateNoPermissionError(napi_env env, const std::string& permission) in CreateNoPermissionError() argument 99 GetNoPermissionErrorMsg(permission)); in CreateNoPermissionError() 102 napi_value CreateJsErrorByNativeErr(napi_env env, int32_t err, const std::string& permission) in CreateJsErrorByNativeErr() argument 105 auto errMsg = (errCode == AbilityErrorCode::ERROR_CODE_PERMISSION_DENIED && !permission.empty()) ? in CreateJsErrorByNativeErr() 106 GetNoPermissionErrorMsg(permission) : GetErrorMsg(errCode); in CreateJsErrorByNativeErr()
|
/foundation/multimedia/media_library/frameworks/services/media_mtp/src/ |
H A D | mtp_service.cpp | 31 const std::vector<std::string> &permission, uint64_t &tokenId) in SetAccessTokenPermission() 33 auto perms = std::make_unique<const char *[]>(permission.size()); in SetAccessTokenPermission() 34 for (size_t i = 0; i < permission.size(); i++) { in SetAccessTokenPermission() 35 perms[i] = permission[i].c_str(); in SetAccessTokenPermission() 40 .permsNum = permission.size(), in SetAccessTokenPermission() 87 perms.push_back("ohos.permission.READ_MEDIA"); in Init() 88 perms.push_back("ohos.permission.WRITE_MEDIA"); in Init() 89 perms.push_back("ohos.permission.MEDIA_LOCATION"); in Init() 90 perms.push_back("ohos.permission.FILE_ACCESS_MANAGER"); in Init() 91 perms.push_back("ohos.permission in Init() 30 SetAccessTokenPermission(const std::string &processName, const std::vector<std::string> &permission, uint64_t &tokenId) SetAccessTokenPermission() argument [all...] |
/foundation/multimedia/media_library/frameworks/innerkitsimpl/test/unittest/get_self_permissions/src/ |
H A D | get_self_permissions.cpp | 31 const std::vector<std::string> &permission, uint64_t &tokenId) in SetAccessTokenPermission() 33 auto perms = std::make_unique<const char *[]>(permission.size()); in SetAccessTokenPermission() 34 for (size_t i = 0; i < permission.size(); i++) { in SetAccessTokenPermission() 35 perms[i] = permission[i].c_str(); in SetAccessTokenPermission() 40 .permsNum = permission.size(), in SetAccessTokenPermission() 81 .permissionName = "ohos.permission.READ_IMAGEVIDEO", in SetHapPermission() 88 .permissionName = "ohos.permission.WRITE_IMAGEVIDEO", in SetHapPermission() 30 SetAccessTokenPermission(const std::string &processName, const std::vector<std::string> &permission, uint64_t &tokenId) SetAccessTokenPermission() argument
|
/foundation/multimedia/ringtone_library/test/unittest/get_self_permissions/src/ |
H A D | get_self_permissions.cpp | 31 const std::vector<std::string> &permission, uint64_t &tokenId) in SetAccessTokenPermission() 33 auto perms = std::make_unique<const char *[]>(permission.size()); in SetAccessTokenPermission() 34 for (size_t i = 0; i < permission.size(); i++) { in SetAccessTokenPermission() 35 perms[i] = permission[i].c_str(); in SetAccessTokenPermission() 40 .permsNum = permission.size(), in SetAccessTokenPermission() 82 .permissionName = "ohos.permission.WRITE_RINGTONE", in SetHapPermission() 30 SetAccessTokenPermission(const std::string &processName, const std::vector<std::string> &permission, uint64_t &tokenId) SetAccessTokenPermission() argument
|
/foundation/ability/ability_runtime/interfaces/inner_api/wantagent/src/ |
H A D | trigger_info.cpp | 25 TriggerInfo::TriggerInfo(const std::string &permission, const std::shared_ptr<WantParams> &extraInfo, in TriggerInfo() argument 28 permission_ = permission; in TriggerInfo() 38 TriggerInfo::TriggerInfo(const std::string &permission, const std::shared_ptr<WantParams> &extraInfo, in TriggerInfo() argument 40 : TriggerInfo(permission, extraInfo, want, resultCode) in TriggerInfo() 103 std::shared_ptr<TriggerInfo::Builder> TriggerInfo::Builder::SetPermission(const std::string &permission) in SetPermission() argument 105 permission_ = permission; in SetPermission()
|
/foundation/communication/nfc/services/src/external_deps/ |
H A D | nfc_permission_checker.cpp | 22 bool NfcPermissionChecker::IsGranted(std::string permission) in IsGranted() argument 28 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in IsGranted() 31 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in IsGranted()
|
/foundation/communication/connected_nfc_tag/services/src/ |
H A D | permission_tools.cpp | 21 bool PermissionTools::IsGranted(std::string permission) in IsGranted() argument 27 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in IsGranted() 30 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in IsGranted()
|
/foundation/communication/netmanager_base/services/netmanagernative/include/manager/ |
H A D | route_manager.h | 112 * @param permission Network permission. Must be one of 116 static int32_t AddInterfaceToDefaultNetwork(const std::string &interfaceName, NetworkPermission permission); 122 * @param permission Network permission. Must be one of 126 static int32_t RemoveInterfaceFromDefaultNetwork(const std::string &interfaceName, NetworkPermission permission); 133 * @param permission Network permission. Must be one of 138 NetworkPermission permission); 145 * @param permission Networ [all...] |
/foundation/ability/ability_runtime/interfaces/inner_api/runtime/include/ |
H A D | js_error_utils.h | 30 void ThrowNoPermissionError(napi_env env, const std::string& permission); 37 napi_value CreateNoPermissionError(napi_env env, const std::string& permission); 38 napi_value CreateJsErrorByNativeErr(napi_env env, int32_t err, const std::string& permission = "");
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/data_share/strategies/data_proxy/ |
H A D | load_config_from_data_proxy_node_strategy.cpp | 40 context->permission = "reject";
in operator ()() 49 context->permission = context->isRead ? proxyData.requiredReadPermission
in operator ()() 51 if (context->permission.empty()) {
in operator ()() 52 context->permission = "reject";
in operator ()() 66 // cross permission can only cross uri like weather,can not cross like datashareproxy://weather
in operator ()() 68 ZLOGI("access has white permission, go");
in operator ()()
|
/foundation/communication/netmanager_base/services/netmanagernative/src/manager/ |
H A D | route_manager.cpp | 168 int32_t RouteManager::AddInterfaceToDefaultNetwork(const std::string &interfaceName, NetworkPermission permission) in AddInterfaceToDefaultNetwork() argument 170 NETNATIVE_LOGI("AddInterfaceToDefaultNetwork, %{public}s;permission:%{public}d;", interfaceName.c_str(), in AddInterfaceToDefaultNetwork() 171 permission); in AddInterfaceToDefaultNetwork() 178 fwmark.permission = permission; in AddInterfaceToDefaultNetwork() 182 mask.permission = permission; in AddInterfaceToDefaultNetwork() 195 int32_t RouteManager::RemoveInterfaceFromDefaultNetwork(const std::string &interfaceName, NetworkPermission permission) in RemoveInterfaceFromDefaultNetwork() argument 197 NETNATIVE_LOGI("RemoveInterfaceFromDefaultNetwork, %{public}s;permission:%{public}d;", interfaceName.c_str(), in RemoveInterfaceFromDefaultNetwork() 198 permission); in RemoveInterfaceFromDefaultNetwork() 222 AddInterfaceToPhysicalNetwork(uint16_t netId, const std::string &interfaceName, NetworkPermission permission) AddInterfaceToPhysicalNetwork() argument 230 RemoveInterfaceFromPhysicalNetwork(uint16_t netId, const std::string &interfaceName, NetworkPermission permission) RemoveInterfaceFromPhysicalNetwork() argument 315 NetworkPermission permission = NetworkPermission::PERMISSION_SYSTEM; UpdateVpnSystemPermissionRule() local 577 UpdateExplicitNetworkRuleWithUid(int32_t netId, uint32_t table, NetworkPermission permission, uid_t uidStart, uid_t uidEnd, bool add) UpdateExplicitNetworkRuleWithUid() argument 602 UpdateOutputInterfaceRulesWithUid(const std::string &interface, uint32_t table, NetworkPermission permission, uid_t uidStart, uid_t uidEnd, bool add) UpdateOutputInterfaceRulesWithUid() argument 745 UpdateClatTunInterface(const std::string &interfaceName, NetworkPermission permission, bool add) UpdateClatTunInterface() argument 852 UpdatePhysicalNetwork(uint16_t netId, const std::string &interfaceName, NetworkPermission permission, bool add) UpdatePhysicalNetwork() argument 881 UpdateIncomingPacketMark(uint16_t netId, const std::string &interfaceName, NetworkPermission permission, bool add) UpdateIncomingPacketMark() argument 905 UpdateExplicitNetworkRule(uint16_t netId, uint32_t table, NetworkPermission permission, bool add) UpdateExplicitNetworkRule() argument 933 UpdateOutputInterfaceRules(const std::string &interfaceName, uint32_t table, NetworkPermission permission, bool add) UpdateOutputInterfaceRules() argument [all...] |
/foundation/ability/ability_runtime/test/moduletest/mock/include/ |
H A D | mock_context.h | 45 virtual int VerifyCallingPermission(const std::string& permission) = 0; 46 virtual int VerifySelfPermission(const std::string& permission) = 0; 50 virtual void UnauthUriPermission(const std::string& permission, const Uri& uri, int uid) = 0; 54 virtual bool CanRequestPermission(const std::string& permission) = 0; 55 virtual int VerifyCallingOrSelfPermission(const std::string& permission) = 0; 56 virtual int VerifyPermission(const std::string& permission, int pid, int uid) = 0;
|
/foundation/graphic/graphic_2d/rosen/test/render_service/render_service/unittest/transaction/ |
H A D | rs_irender_service_connection_ipc_interface_code_access_verifier_test.cpp | 76 for (auto& permission : permissions) { in HWTEST_F() 77 ASSERT_EQ(verifier->CheckNativePermission(tokenID, permission), false); in HWTEST_F() 95 for (auto& permission : permissions) { in HWTEST_F() 96 ASSERT_EQ(verifier->CheckHapPermission(tokenID, permission), false); in HWTEST_F() 110 PermissionType permission = PermissionType::CAPTURE_SCREEN; in HWTEST_F() local 111 ASSERT_TRUE(verifier->PermissionEnumToString(permission) != "unknown"); in HWTEST_F()
|
/foundation/graphic/graphic_2d/rosen/test/render/render/unittest/transaction/ |
H A D | rs_irender_service_connection_ipc_interface_code_access_verifier_unittest_test.cpp | 62 for (auto& permission : permissions) { in HWTEST_F() 63 ASSERT_EQ(verifier->CheckNativePermission(tokenID, permission), false); in HWTEST_F() 100 for (auto& permission : permissions) { in HWTEST_F() 101 ASSERT_EQ(verifier->CheckHapPermission(tokenID, permission), false); in HWTEST_F() 115 PermissionType permission = PermissionType::CAPTURE_SCREEN; in HWTEST_F() local 116 ASSERT_TRUE(verifier->PermissionEnumToString(permission) != "unknown"); in HWTEST_F()
|
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/src/ |
H A D | permission.cpp | 14 * Description: add permission utils 18 #include "permission.h" 37 std::string GetPermissionDescription(const std::string &permission) in GetPermissionDescription() argument 39 if (permission == "ohos.permission.ACCESS_CAST_ENGINE_MIRROR") { in GetPermissionDescription() 40 return "Mirror permission"; in GetPermissionDescription() 42 if (permission == "ohos.permission.ACCESS_CAST_ENGINE_STREAM") { in GetPermissionDescription() 43 return "Stream permission"; in GetPermissionDescription() 45 return "Unkown permission"; in GetPermissionDescription() 48 CheckPermission(const std::string &permission) CheckPermission() argument [all...] |
/foundation/CastEngine/castengine_cast_plus_stream/src/utils/src/ |
H A D | permission.cpp | 14 * Description: add permission utils 18 #include "permission.h" 37 std::string GetPermissionDescription(const std::string &permission) in GetPermissionDescription() argument 39 if (permission == "ohos.permission.ACCESS_CAST_ENGINE_MIRROR") { in GetPermissionDescription() 40 return "Mirror permission"; in GetPermissionDescription() 42 if (permission == "ohos.permission.ACCESS_CAST_ENGINE_STREAM") { in GetPermissionDescription() 43 return "Stream permission"; in GetPermissionDescription() 45 return "Unkown permission"; in GetPermissionDescription() 48 CheckPermission(const std::string &permission) CheckPermission() argument [all...] |
/foundation/barrierfree/accessibility/frameworks/common/src/ |
H A D | accessibility_permission.cpp | 24 bool Permission::CheckCallingPermission(const std::string& permission) in CheckCallingPermission() argument 26 HILOG_DEBUG("permission %{public}s", permission.c_str()); in CheckCallingPermission() 27 if (Security::AccessToken::AccessTokenKit::VerifyAccessToken(IPCSkeleton::GetCallingTokenID(), permission) != in CheckCallingPermission() 29 HILOG_DEBUG("permission denied"); in CheckCallingPermission() 33 HILOG_DEBUG("permission ok!"); in CheckCallingPermission()
|
/foundation/bundlemanager/bundle_framework/services/bundlemgr/src/ |
H A D | bundle_permission_mgr.cpp | 67 for (const auto &permission : permissions) { in Init() 68 defaultPermissions_.try_emplace(permission.bundleName, permission); in Init() 150 LOG_NOFUNC_I(BMS_TAG_DEFAULT, "-n %{public}s apl:%{public}s req permission size:%{public}zu, acls size:%{public}zu", in CreateHapPolicyParam() 153 // default permission list in CreateHapPolicyParam() 154 DefaultPermission permission; in CreateHapPolicyParam() local 155 if (!GetDefaultPermission(innerBundleInfo.GetBundleName(), permission)) { in CreateHapPolicyParam() 160 if (!MatchSignature(permission, innerBundleInfo.GetCertificateFingerprint()) && in CreateHapPolicyParam() 161 !MatchSignature(permission, innerBundleInfo.GetAppId()) && in CreateHapPolicyParam() 162 !MatchSignature(permission, innerBundleInf in CreateHapPolicyParam() 353 GetDefaultPermission( const std::string &bundleName, DefaultPermission &permission) GetDefaultPermission() argument 367 MatchSignature( const DefaultPermission &permission, const std::vector<std::string> &signatures) MatchSignature() argument 383 MatchSignature( const DefaultPermission &permission, const std::string &signature) MatchSignature() argument 583 AddPermissionUsedRecord( const std::string &permission, int32_t successCount, int32_t failCount) AddPermissionUsedRecord() argument [all...] |
/foundation/ability/ability_runtime/test/unittest/trigger_Info_test/ |
H A D | trigger_Info_test.cpp | 87 std::string permission = "nihao"; in HWTEST_F() local 96 TriggerInfo triggerInfo(permission, wParams, want, resultCode); in HWTEST_F() 97 EXPECT_EQ(triggerInfo.permission_, permission); in HWTEST_F() 113 std::string permission = "nihao"; in HWTEST_F() local 122 TriggerInfo triggerInfo(permission, wParams, want, resultCode); in HWTEST_F() 123 EXPECT_EQ(triggerInfo.permission_, permission); in HWTEST_F() 248 std::string permission = "nihao"; in HWTEST_F() local 257 TriggerInfo triggerInfo1(permission, wParams, want, resultCode); in HWTEST_F() 260 EXPECT_EQ(triggerInfo2.permission_, permission); in HWTEST_F()
|